{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T23:47:52Z","timestamp":1776642472761,"version":"3.51.2"},"publisher-location":"Cham","reference-count":63,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032161642","type":"print"},{"value":"9783032161659","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-16165-9_34","type":"book-chapter","created":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T23:26:08Z","timestamp":1776641168000},"page":"578-598","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PIM: A Metric to\u00a0Empower Mobile App Users in\u00a0Privacy Management"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2546-9246","authenticated-orcid":false,"given":"Amador","family":"Aparicio","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3151-0842","authenticated-orcid":false,"given":"M. Mercedes","family":"Mart\u00ednez-Gonz\u00e1lez","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9717-0824","authenticated-orcid":false,"given":"Alejandro","family":"P\u00e9rez-Fuente","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-7038-6378","authenticated-orcid":false,"given":"Pablo-Abel","family":"Criado-Lozano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"34_CR1","unstructured":"Android developers - app permissions overview. https:\/\/developer.android.com\/guide\/topics\/permissions\/overview. Accessed April 2025"},{"key":"34_CR2","unstructured":"Deliberately confusing language in terms of service and privacy policy agreements. Issues In Information Systems (2022). https:\/\/api.semanticscholar.org\/CorpusID:252322031"},{"key":"34_CR3","doi-asserted-by":"publisher","unstructured":"Akbar, F., Hussain, M., Mumtaz, R., Riaz, Q., Wahab, A.W.A., Jung, K.: Permissions-based detection of android malware using machine learning. Symmetry 14(4), 718 (2022). https:\/\/doi.org\/10.3390\/SYM14040718","DOI":"10.3390\/SYM14040718"},{"key":"34_CR4","doi-asserted-by":"publisher","first-page":"216671","DOI":"10.1109\/ACCESS.2020.3041432","volume":"8","author":"IM Almomani","year":"2020","unstructured":"Almomani, I.M., Al Khayer, A.: A comprehensive analysis of the android permissions system. IEEE Access 8, 216671\u2013216688 (2020)","journal-title":"IEEE Access"},{"key":"34_CR5","unstructured":"Android Open Source Project: AndroidManifest.xml (sf). https:\/\/github.com\/aosp-mirror\/platform_frameworks_base\/blob\/master\/core\/res\/AndroidManifest.xml. recuperado 15 de febrero de 2025"},{"issue":"7","key":"34_CR6","doi-asserted-by":"publisher","first-page":"6451","DOI":"10.1007\/S11276-023-03455-W","volume":"30","author":"A Aparicio","year":"2024","unstructured":"Aparicio, A., Mart\u00ednez-Gonz\u00e1lez, M.M., Carde\u00f1oso-Payo, V.: App-based detection of vulnerable implementations of OTP SMS APIs in the banking sector. Wirel. Networks 30(7), 6451\u20136464 (2024). https:\/\/doi.org\/10.1007\/S11276-023-03455-W","journal-title":"Wirel. Networks"},{"key":"34_CR7","unstructured":"Calciati, P.: Understanding the Evolution of Android Applications. Ph.D. thesis, Technical University of Madrid, Spain (2019). https:\/\/oa.upm.es\/57886\/"},{"issue":"2","key":"34_CR8","doi-asserted-by":"publisher","first-page":"975","DOI":"10.1109\/TDSC.2022.3146020","volume":"20","author":"D Caputo","year":"2023","unstructured":"Caputo, D., Pagano, F., Bottino, G., Verderame, L., Merlo, A.: You can\u2019t always get what you want: towards user-controlled privacy on android. IEEE Trans. Dependable Secur. Comput. 20(2), 975\u2013987 (2023). https:\/\/doi.org\/10.1109\/TDSC.2022.3146020","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"34_CR9","doi-asserted-by":"publisher","unstructured":"Choe, Y., Yu, H., Kim, T., Lee, S., Lee, H., Kim, H.: (in)visible privacy indicator: Security analysis of privacy indicator on android devices. In: Zhou, J., Quek, T.Q.S., Gao, D., C\u00e1rdenas, A.A. (eds.) Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2024, Singapore, 1\u20135 July 2024. ACM (2024). https:\/\/doi.org\/10.1145\/3634737.3645014","DOI":"10.1145\/3634737.3645014"},{"key":"34_CR10","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/J.FUTURE.2023.05.021","volume":"148","author":"G D\u2019Angelo","year":"2023","unstructured":"D\u2019Angelo, G., Farsimadan, E., Ficco, M., Palmieri, F., Robustelli, A.: Privacy-preserving malware detection in android-based IoT devices through federated Markov chains. Future Gener. Comput. Syst. 148, 93\u2013105 (2023). https:\/\/doi.org\/10.1016\/J.FUTURE.2023.05.021","journal-title":"Future Gener. Comput. Syst."},{"key":"34_CR11","unstructured":"Developers, A.: Android permission groups (2025). https:\/\/developer.android.com\/reference\/android\/Manifest.permission_group"},{"key":"34_CR12","unstructured":"European Commission: Eurobarometer: Europeans show support for digital principles. Press release (2021). https:\/\/ec.europa.eu\/commission\/presscorner\/api\/files\/document\/print\/en\/ip_21_6462\/IP_21_6462_EN.pdf. disponible en l\u00ednea"},{"key":"34_CR13","doi-asserted-by":"crossref","unstructured":"Feal, \u00c1., Calciati, P., Vallina-Rodriguez, N., Troncoso, C., Gorla, A.: Angel or devil? A privacy study of mobile parental control apps. Proc. Priv. Enhancing Technol. (2020)","DOI":"10.2478\/popets-2020-0029"},{"key":"34_CR14","doi-asserted-by":"crossref","unstructured":"Flensburg, S., Lai, S.S.: Datafied mobile markets measuring control over apps, data accesses, and third-party services (2021). https:\/\/api.semanticscholar.org\/CorpusID:242048476","DOI":"10.1177\/20501579211039066"},{"key":"34_CR15","doi-asserted-by":"publisher","unstructured":"Fratantonio, Y., Qian, C., Chung, S.P., Lee, W.: Cloak and dagger: from two permissions to complete control of the UI feedback loop. In: 2017 IEEE Symposium on Security and Privacy, SP 2017, San Jose, CA, USA, 22\u201326 May 2017, pp. 1041\u20131057. IEEE Computer Society (2017). https:\/\/doi.org\/10.1109\/SP.2017.39","DOI":"10.1109\/SP.2017.39"},{"issue":"4","key":"34_CR16","doi-asserted-by":"publisher","first-page":"96","DOI":"10.2478\/POPETS-2021-0062","volume":"2021","author":"R G\u00e1lvez","year":"2021","unstructured":"G\u00e1lvez, R., Moonsamy, V., D\u00edaz, C.: Less is more: a privacy-respecting android malware classifier using federated learning. Proc. Priv. Enhancing Technol. 2021(4), 96\u2013116 (2021). https:\/\/doi.org\/10.2478\/POPETS-2021-0062","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"34_CR17","doi-asserted-by":"publisher","unstructured":"Guerra, M., Milanese, R., Deodato, M., Perozzi, V., Fasano, F.: Visual attention and privacy indicators in android: Insights from eye tracking. In: Lenzini, G., Mori, P., Furnell, S. (eds.) Proceedings of the 10th International Conference on Information Systems Security and Privacy, ICISSP 2024, Rome, Italy, 26\u201328 February 2024, pp. 320\u2013329. SCITEPRESS (2024). https:\/\/doi.org\/10.5220\/0012437600003648","DOI":"10.5220\/0012437600003648"},{"issue":"10","key":"34_CR18","doi-asserted-by":"publisher","first-page":"4610","DOI":"10.1109\/TSE.2023.3308392","volume":"49","author":"M Guerra","year":"2023","unstructured":"Guerra, M., Scalabrino, S., Fasano, F., Oliveto, R.: An empirical study on the effectiveness of privacy indicators. IEEE Trans. Software Eng. 49(10), 4610\u20134623 (2023). https:\/\/doi.org\/10.1109\/TSE.2023.3308392","journal-title":"IEEE Trans. Software Eng."},{"key":"34_CR19","doi-asserted-by":"crossref","unstructured":"Hamidreza, A., Mohammed, N.: Permission-based analysis of android applications using categorization and deep learning scheme. In: MATEC Web of Conferences, vol.\u00a0255, p. 05005. EDP Sciences (2019)","DOI":"10.1051\/matecconf\/201925505005"},{"key":"34_CR20","doi-asserted-by":"publisher","unstructured":"Hashmi, S.S., Waheed, N., Tangari, G., Ikram, M., Smith, S.: Longitudinal compliance analysis of android applications with privacy policies. In: Hara, T., Yamaguchi, H. (eds.) Mobile and Ubiquitous Systems: Computing, Networking and Services - 18th EAI International Conference, MobiQuitous 2021, Virtual Event, 8\u201311 November 2021, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol.\u00a0419, pp. 280\u2013305. Springer (2021). https:\/\/doi.org\/10.1007\/978-3-030-94822-1_16,","DOI":"10.1007\/978-3-030-94822-1_16"},{"key":"34_CR21","unstructured":"Hazim, A.: Privacy visualizations: introducing an interactive visualization of privacy indicators based on exodus privacy to F-Droid (2023)"},{"key":"34_CR22","unstructured":"International Electrotechnical Commission: IEC 60050 - International Electrotechnical Vocabulary - Details for IEV number 871-04-23: Privacy (sf). https:\/\/www.electropedia.org\/iev\/iev.nsf\/display?openform&ievref=871-04-23. recuperado 11 de febrero de 2022"},{"key":"34_CR23","unstructured":"yung Kim, J., Yoon, Y., Yi, K.: Static analyzer for detecting privacy leaks in android applications (2012). https:\/\/api.semanticscholar.org\/CorpusID:267870077"},{"key":"34_CR24","doi-asserted-by":"crossref","unstructured":"Lai, S.S., Flensburg, S.: A proxy for privacy uncovering the surveillance ecology of mobile apps. Big Data Soc. 7 (2020). https:\/\/api.semanticscholar.org\/CorpusID:225640889","DOI":"10.1177\/2053951720942543"},{"key":"34_CR25","doi-asserted-by":"crossref","unstructured":"Lavranou, R., Karagiannis, S., Tsohou, A., Magkos, E.: Unraveling the complexity of mobile application permissions: strategies to enhance users\u2019 privacy education. Eur. J. Eng. Technol. Res., 87\u201395 (2023)","DOI":"10.24018\/ejeng.2023.1.CIE.3141"},{"key":"34_CR26","unstructured":"Li, L., et al.: I know what leaked in your pocket: uncovering privacy leaks on android apps with static taint analysis (2014). ArXiv: abs\/1404.7431"},{"key":"34_CR27","doi-asserted-by":"publisher","unstructured":"Lim, J.G.Q., et al.: A-COPILOT: android covert operation for private information lifting and OTP theft: a study on how malware masquerading as legitimate applications compromise security and privacy. In: Vilela, J.P., Schulmann, H., Li, N. (eds.) Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy, CODASPY 2024, Porto, Portugal, 19\u201321 June 2024, pp. 155\u2013157. ACM (2024). https:\/\/doi.org\/10.1145\/3626232.3658638","DOI":"10.1145\/3626232.3658638"},{"key":"34_CR28","doi-asserted-by":"crossref","unstructured":"Liu, M., Wang, Q.: Research on android user privacy permission analysis and protection mechanism under big data environment. In: MATEC Web of Conferences (2024). https:\/\/api.semanticscholar.org\/CorpusID:269854220","DOI":"10.1051\/matecconf\/202439501028"},{"key":"34_CR29","doi-asserted-by":"crossref","unstructured":"Liu, X., Leng, Y., Yang, W., Wang, W., Zhai, C., Xie, T.: A large-scale empirical study on android runtime-permission rationale messages. 2018 IEEE Symposium on Visual Languages and Human-Centric Computing (VL\/HCC), pp. 137\u2013146 (2018). https:\/\/api.semanticscholar.org\/CorpusID:51917470","DOI":"10.1109\/VLHCC.2018.8506574"},{"key":"34_CR30","unstructured":"Mann, H., Wigren, A.: Risk assessment of managed smartphones using MDM: an automated approach to security and privacy analysis (2024)"},{"key":"34_CR31","doi-asserted-by":"publisher","unstructured":"Marono, J., Silva, C., Barraca, J.P., Cunha, V.A., Salvador, P.: Assessing mobile application privacy: a quantitative framework for privacy measurement. CoRR abs\/2311.00066 (2023). https:\/\/doi.org\/10.48550\/ARXIV.2311.00066","DOI":"10.48550\/ARXIV.2311.00066"},{"key":"34_CR32","unstructured":"Mart\u00ednez-Gonz\u00e1lez, M.M., Aparicio, A., P\u00e9rez\u00a0Fuente, A., Criado\u00a0Lozano, P.A., Gonzalo\u00a0Tasis, M., Moro, Q.I., et\u00a0al.: Marco para una autoprotecci\u00f3n eficaz de la privacidad en entornos m\u00f3viles. XVIII Reuni\u00f3n Espa\u00f1ola sobre Criptolog\u00eda y Seguridad de la Informaci\u00f3n: XVIII RECSI, Le\u00f3n 23\u201325 octubre 2024, pp. 237\u2013242"},{"key":"34_CR33","unstructured":"Mavroudis, V., Hao, S., Fratantonio, Y., Maggi, F., Vigna, G., Kruegel, C.: Talking behind your back: attacks and countermeasures of ultrasonic cross-device tracking. Black Hat Europe, London, UK 109 (2016)"},{"key":"34_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3448609","volume":"24","author":"R Mayrhofer","year":"2021","unstructured":"Mayrhofer, R., Stoep, J.V., Brubaker, C., Kralevich, N.: The android platform security model. ACM Trans. Priv. Secur. (TOPS) 24, 1\u201335 (2021)","journal-title":"ACM Trans. Priv. Secur. (TOPS)"},{"key":"34_CR35","unstructured":"Mayrhofer, R., et al.: The android platform security model (2023). Tech. rep., Cornell University (2023). https:\/\/arxiv.org\/pdf\/1904.05572\/1000.pdf"},{"key":"34_CR36","doi-asserted-by":"publisher","unstructured":"Meng, M.H., et al.: A large-scale privacy assessment of android third-party SDKs. CoRR abs\/2409.10411 (2024). https:\/\/doi.org\/10.48550\/ARXIV.2409.10411","DOI":"10.48550\/ARXIV.2409.10411"},{"key":"34_CR37","unstructured":"P\u00e9rez-Fuente, A., Mart\u00ednez-Gonz\u00e1lez, M.M., Aparicio, A., Moro, Q.I.: A data warehouse for mobile application privacy and security study. Tech. rep. (2024)"},{"key":"34_CR38","doi-asserted-by":"crossref","unstructured":"Peruma, A.S., Palmerino, J., Krutz, D.E.: Investigating user perception and comprehension of android permission models. In: 2018 IEEE\/ACM 5th International Conference on Mobile Software Engineering and Systems (MOBILESoft), pp. 56\u201366 (2018)","DOI":"10.1145\/3197231.3197246"},{"key":"34_CR39","doi-asserted-by":"publisher","unstructured":"Picalho, A.C., de\u00a0Oliveira\u00a0Lucas, E.R.: \u201cli e aceito os termos de uso\u201d: iniciativas de aux\u00edlio ao usu\u00e1rio em meio ao que pode ser uma das maiores mentiras da internet. AWARI 3, 1\u20137 (2022). https:\/\/doi.org\/10.47909\/awari.152","DOI":"10.47909\/awari.152"},{"key":"34_CR40","doi-asserted-by":"publisher","first-page":"121581","DOI":"10.1016\/J.INS.2024.121581","volume":"690","author":"MD Preda","year":"2025","unstructured":"Preda, M.D., Greco, C., Ianni, M., Lupia, F., Pugliese, A.: Light sensor based covert channels on mobile devices. Inf. Sci. 690, 121581 (2025). https:\/\/doi.org\/10.1016\/J.INS.2024.121581","journal-title":"Inf. Sci."},{"key":"34_CR41","doi-asserted-by":"publisher","unstructured":"Pybus, J., Cot\u00e9, M.: Super SDKs: tracking personal data and platform monopolies in the mobile. Big Data Soc. 11(1) (2024). https:\/\/doi.org\/10.1177\/20539517241231270","DOI":"10.1177\/20539517241231270"},{"key":"34_CR42","doi-asserted-by":"publisher","unstructured":"Quattrone, A., Kulik, L., Tanin, E., Ramamohanarao, K., Gu, T.: PrivacyPalisade: evaluating app permissions and building privacy into smartphones. In: 10th International Conference on Information, Communications and Signal Processing, ICICS 2015, Singapore, 2\u20134, December 2015, pp.\u00a01\u20135. IEEE (2015). https:\/\/doi.org\/10.1109\/ICICS.2015.7459926","DOI":"10.1109\/ICICS.2015.7459926"},{"key":"34_CR43","unstructured":"Rathore, H., Sahay, S.K., Rajvanshi, R., Sewak, M.: Identification of significant permissions for efficient android malware detection. CoRR abs\/2103.00643 (2021). https:\/\/arxiv.org\/abs\/2103.00643"},{"key":"34_CR44","doi-asserted-by":"publisher","unstructured":"Ren, J., Rao, A., Lindorfer, M., Legout, A., Choffnes, D.R.: ReCon: revealing and controlling PII leaks in mobile network traffic. In: Balan, R.K., Misra, A., Agarwal, S., Mascolo, C. (eds.) Proceedings of the 14th Annual International Conference on Mobile Systems, Applications, and Services, MobiSys 2016, Singapore, 26\u201330 June 2016, pp. 361\u2013374. ACM (2016). https:\/\/doi.org\/10.1145\/2906388.2906392","DOI":"10.1145\/2906388.2906392"},{"issue":"5","key":"34_CR45","doi-asserted-by":"publisher","first-page":"1763","DOI":"10.1213\/ANE.0000000000002864","volume":"126","author":"P Schober","year":"2018","unstructured":"Schober, P., Boer, C., Schwarte, L.A.: Correlation coefficients: appropriate use and interpretation. Anesthesia Analg. 126(5), 1763\u20131768 (2018)","journal-title":"Anesthesia Analg."},{"key":"34_CR46","first-page":"10","volume":"2015","author":"K Sokolova","year":"2015","unstructured":"Sokolova, K., Lemercier, M., Perez, C.: Android permission usage: a first step towards detecting abusive applications. PATTERNS 2015, 10 (2015)","journal-title":"PATTERNS"},{"issue":"3","key":"34_CR47","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/S41019-022-00189-1","volume":"7","author":"HX Son","year":"2022","unstructured":"Son, H.X., Carminati, B., Ferrari, E.: A risk estimation mechanism for android apps based on hybrid analysis. Data Sci. Eng. 7(3), 242\u2013252 (2022). https:\/\/doi.org\/10.1007\/S41019-022-00189-1","journal-title":"Data Sci. Eng."},{"key":"34_CR48","unstructured":"Soneji, S., Panda, S., Neve, S., Dodge, J.: Signed, sealed,... confused: Exploring the understandability and severity of policy documents (2025). ArXiv: abs\/2502.08743. https:\/\/api.semanticscholar.org\/CorpusID:276318061"},{"key":"34_CR49","doi-asserted-by":"crossref","unstructured":"Srinath, M., Venkit, P.N., Badillo, M., Schaub, F., Giles, C.L., Wilson, S.: Automated detection and analysis of data practices using a real-world corpus. In: Annual Meeting of the Association for Computational Linguistics (2024). https:\/\/api.semanticscholar.org\/CorpusID:267751256","DOI":"10.18653\/v1\/2024.findings-acl.271"},{"key":"34_CR50","doi-asserted-by":"crossref","unstructured":"Stach, C.: How to assure privacy on android phones and devices? In: 2013 IEEE 14th International Conference on Mobile Data Management, vol.\u00a01, pp. 350\u2013352. IEEE (2013)","DOI":"10.1109\/MDM.2013.54"},{"key":"34_CR51","unstructured":"Stevens, R., Gibler, C., Crussell, J., Erickson, J., Chen, H.: Investigating user privacy in android ad libraries. In: Workshop on Mobile Security Technologies (MoST), vol.\u00a010, pp. 195\u2013197 (2012)"},{"issue":"2","key":"34_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3574158","volume":"32","author":"X Sun","year":"2023","unstructured":"Sun, X., et al.: Demystifying hidden sensitive operations in android apps. ACM Trans. Softw. Eng. Methodol. 32(2), 1\u201330 (2023). https:\/\/doi.org\/10.1145\/3574158","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"34_CR53","doi-asserted-by":"crossref","unstructured":"Sun, X., Chen, X., Liu, K., Wen, S., Li, L., Grundy, J.: Characterizing sensor leaks in android apps. In: 2021 IEEE 32nd International Symposium on Software Reliability Engineering (ISSRE), pp. 498\u2013509. IEEE (2021)","DOI":"10.1109\/ISSRE52982.2021.00058"},{"key":"34_CR54","unstructured":"Sun, X., Chen, X., Liu, K., Wen, S., Li, L., Grundy, J.C.: Characterizing sensor leaks in android apps. CoRR abs\/2201.06235 (2022). https:\/\/arxiv.org\/abs\/2201.06235"},{"key":"34_CR55","unstructured":"Terms of Service; Didn\u2019t Read: ToS;DR: Analyzing Terms of Service and Privacy Policies (2025). https:\/\/tosdr.org\/. Accessed 20 Apr 2025"},{"issue":"Suppl 1","key":"34_CR56","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1007\/S10586-017-1364-8","volume":"22","author":"LH Tuan","year":"2019","unstructured":"Tuan, L.H., Cam, N.T., Pham, V.: Enhancing the accuracy of static analysis for detecting sensitive data leakage in android by using dynamic analysis. Clust. Comput. 22(Suppl 1), 1079\u20131085 (2019). https:\/\/doi.org\/10.1007\/S10586-017-1364-8","journal-title":"Clust. Comput."},{"issue":"6","key":"34_CR57","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSEC.2024.3461629","volume":"22","author":"GS Tuncay","year":"2024","unstructured":"Tuncay, G.S.: Android permissions: evolution, attacks, and best practices. IEEE Secur. Priv. 22(6), 40\u201349 (2024). https:\/\/doi.org\/10.1109\/MSEC.2024.3461629","journal-title":"IEEE Secur. Priv."},{"key":"34_CR58","doi-asserted-by":"crossref","unstructured":"Tyagi, V., Singh, R., Tripathi, A., Agarwal, V., Pandey, S.: An android app permission analysis for user privacy and security. In: Futuristic Trends for Sustainable Development and Sustainable Ecosystems, pp. 89\u2013103. IGI Global (2022)","DOI":"10.4018\/978-1-6684-4225-8.ch006"},{"key":"34_CR59","doi-asserted-by":"crossref","unstructured":"Upadhayay, M., Sharma, A., Garg, G., Arora, A.: RPNDroid: android malware detection using ranked permissions and network traffic. In: 2021 Fifth World Conference on Smart Trends in Systems Security and Sustainability (WorldS4), pp. 19\u201324 (2021)","DOI":"10.1109\/WorldS451998.2021.9513992"},{"key":"34_CR60","unstructured":"Wijesekera, P., Baokar, A., Hosseini, A., Egelman, S., Wagner, D.A., Beznosov, K.: Android permissions Remystified: a field study on contextual integrity. In: Jung, J., Holz, T. (eds.) 24th USENIX Security Symposium, USENIX Security 15, Washington, D.C., USA, 12\u201314 August 2015, pp. 499\u2013514. USENIX Association (2015). https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/wijesekera"},{"key":"34_CR61","doi-asserted-by":"publisher","unstructured":"Wu, Y., et al.: TraceDroid: aetecting android malware by trace of privacy leakage. In: Wang, L., Segal, M., Chen, J., Qiu, T. (eds.) Wireless Algorithms, Systems, and Applications - 17th International Conference, WASA 2022, Dalian, China, 24\u201326 November 2022, Proceedings, Part I. Lecture Notes in Computer Science, vol. 13471, pp. 466\u2013478. Springer (2022). https:\/\/doi.org\/10.1007\/978-3-031-19208-1_38","DOI":"10.1007\/978-3-031-19208-1_38"},{"key":"34_CR62","doi-asserted-by":"crossref","unstructured":"Yang, Z., et al.: FSAFlow: lightweight and fast dynamic path tracking and control for privacy protection on android using hybrid analysis with state-reduction strategy. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 2114\u20132129 (2022). https:\/\/api.semanticscholar.org\/CorpusID:251140982","DOI":"10.1109\/SP46214.2022.9833764"},{"key":"34_CR63","doi-asserted-by":"publisher","unstructured":"Zhou, Y.: An automated pipeline for privacy leak analysis of android applications. In: ASE 2021, pp. 1048\u20131050. IEEE (2021). https:\/\/doi.org\/10.1109\/ASE51524.2021.9678875","DOI":"10.1109\/ASE51524.2021.9678875"}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2025 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-16165-9_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,19]],"date-time":"2026-04-19T23:26:13Z","timestamp":1776641173000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-16165-9_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032161642","9783032161659"],"references-count":63,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-16165-9_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}